Dear Reader, 

It has been hectic summer for us at Cyber Protection Magazine as we try to keep up with the world’s increasing concern over cybercrime containment. We even hit a milestone in August as we  published our 100th post. Not bad for a fledgling publication less than a year old.

The consolidation of technologies providing various forms of protection now includes blockchain and cloud-based SIEM. Black Hat Las Vegas dominated our coverage and the connections we made with exhibitors and presenters will be following us for the coming months

Plenty of topics to cover, so with no further ado: enjoy reading our newsletter. 

Best regards

Patrick Boch & Lou Covey
Editors

Video Highlights

Our Video Bytes series is becoming quite the library of expert guidance. We had a two-parter with Mike Kiser, Senior Strategist at Sailpoint and Alan Grau, VP of IoT at Sectigo discussing the definition of identity. Surya Varanasi, CTO of StorCentric, gave some tips on protecting yourself from ransomware through backups, and Gijsbert Janssen van Doorn gave us an update on why ransomware is so popular.

Video Byte Special: What is Identity?
What is that identity that people always talk about and why does it need protection? We spoke with two experts on the matter.
Read more...
Video Byte: Why is Ransomware so popular?
Looking at some of the recent cybersecurity headlines , there is a lot of talk on ransomware. Apparently, ransomware is by far the most "popular" form of attack. We wondered…
Read more...

Podcasts

 Our US editor, Lou Covey debated EU editor Patrick Boch on whether Apple’s (now delayed) plan to scan iCloud accounts for child porn is a good idea and (spoiler, we still don’t agree.)

Apple's porn scan is bad, unless you think it is good
US editor Lou Covey thinks the GDPR, CCPA and a host of other potential legislation has already begun a slide toward government control of technology. On the other hand, EU editor Patrick Boch thinks Apple’s decision in the impetus. In either case, one has to decide whether making it difficult for child abusers to pursue their kink is worth the potential loss of privacy, or if privacy is an absolute right.
Read more...

Black Hat

Our US editor attended Black Hat Conference 2021 virtually and came back with some blockbuster pronouncements. First was the keynote by Matt Tait, COO of Corellium, who said the marketing practices of the security research industry enable cybercrime worldwide.  Then there was a panel on how CEOs are feeling the heat from board members to adequately defend companies from cyberattacks. We are still digging out on the massive amount of data from that conference so expect more to come.

Researchers unwittingly assist in cybercrime
At Black Hat Conference 2021, Matt Tait said the marketing practices of the security research industry enable cybercrime worldwide. Considering that the conference is dedicated to that industry, it was…
Read more...
Panel says CEOs facing pressure to bolster security
CEOs in large enterprises are feeling the heat from board members to adequately defend companies - Cyber Protection Magazine reports from Black Hat USA 2021 #BHUSA #BlackHat
Read more...

Micropages

We’d like to thank our small but growing group of sponsors over the past 8 months and highlight one: Zerto, bringing together disaster recovery, backup, and data mobility into a single, simple cloud data management and protection solution. You can visit their Cyber Protection Magazine micropage here.

Security basics

 Like all tech industries, cybersecurity loves it’s acronyms and fancy terms. So we introduced a new series explaining some of the more fancy terms of the cybersecurity industry. First up, the emptiness of the term Zero Trust.

The Cybersecurity Cheat Sheet: Zero Trust
Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point and with a good dose…
Read more...

Outside voices

 Our friends at EE Journal discovered an interesting product out of St. Louis, Missouri that sets up a walled garden inside a corporate network that doesn’t permit outside sources to update software, a favorite access point for malware. It’s one of many similar products on the market but at least you know about this one now. And the ever-entertaining Max Maxfield rambles on for a while before getting to the point about securing data at rest

 Coming up

 Electric vehicles are considered the way of the future for transportation, energy storage and a cleaner planet. They are also offering a wealth of new attack vectors for malware intrusions, ransomware and outright theft. We’ve started investigating what the potential is for chaos. We will be looking at both the problems presented and how new approaches to blockchain m might be a way of securing them.

Thanks for reading and if you liked our newsletter, please share it with friends and colleagues.

facebook  twitter  linkedin  youtube 
Cyber Protection Magazine
https://cyberprotection-magazine.com
Modify your subscription    |    View online